Apply

Security Analyst

Posted 7 days agoViewed

View full description

πŸ’Έ Salary: 95000.0 - 150000.0 USD per year

🏒 Company: NIH-NCBI

πŸ—£οΈ Languages: English

Requirements:
  • B.S or higher degree in Computer Science.
  • Working knowledge and demonstrated experience in network design, network security, and firewall technologies. Experience with Fortinet preferred.
  • Experience with testing and identifying network and system vulnerabilities using tools from vendors such as Tenable, IBM, Checkmarx, and Netsparker.
  • Experience with log analysis. Experience with Splunk preferred.
  • Good understanding of computing security, authentication techniques, operation procedures and general practices in an enterprise IT infrastructure.
  • Demonstrated self-initiated ability for analyzing, debugging, and tracking security issues.
  • Identifies problems, determines the accuracy and relevance of information, and uses sound judgment to generate and evaluate alternatives, and to make recommendations.
  • Excellent organization and time management skills and ability to identify priorities as needed to accomplish a variety of tasks.
  • Excellent written and oral communication skills and ability to work with people at every level.
Responsibilities:
  • Application security monitoring (web scanning) to include performing source code analysis and web scanning using COTS tools.
  • Vulnerability management using Security Center.
  • Analyze architecture and system functionality for a broad range of technologies.
  • Log analysis for incident remediation/threat hunting.
  • Troubleshooting security and network problems.
  • Provide support in the areas of information assurance, vulnerability assessment, enterprise protection planning, security monitoring, incident response, cyber security, and cyber threat analysis.
  • Firewall management.
Apply

Related Jobs

Apply
πŸ”₯ Security Analyst
Posted about 8 hours ago

πŸ“ United States, Canada

🧭 Full-Time

πŸ’Έ 114750.0 - 120000.0 USD per year

πŸ” Biotechnology

🏒 Company: BenchlingπŸ‘₯ 501-1000πŸ’° $100,000,000 Series F over 3 years agoBiotechnologyLife ScienceSoftware

  • 1+ years of Incident Response experience
  • Experience participating in multi-team incidents
  • Practical experience with attacker tactics and techniques
  • Experience with cloud environments and automation
  • Experience in at least one scripting language, preferably Python
  • Coordinate investigations across the organization
  • Drive multi-functional incident response
  • Build efficient processes for handling investigations

PythonCloud ComputingScripting

Posted about 8 hours ago
Apply
Apply

πŸ“ United States

🧭 Internship

πŸ’Έ 15.0 - 22.0 USD per hour

🏒 Company: Ensono

  • Basic understanding of [relevant skills or tools, e.g., Microsoft Office, PowerBi, etc.].
  • Strong written and verbal communication skills.
  • Excellent organizational and time management abilities.
  • Ability to work independently and as part of a team.
  • Excellent attention to detail and accuracy.
  • Knowledge of data protection regulations and compliance standards.
  • Strong communication and interpersonal skills.
  • Overseeing the organization, storage, retrieval, and security of documents within the company. This role involves implementing document management systems, ensuring compliance with regulatory requirements, and facilitating efficient document workflows.
  • Conduct supplier audits and assessments as needed.
  • Identify areas for improvement and work with suppliers to implement corrective actions.
  • Work with various departments to develop and document risk mitigation strategies and action plans.
  • Monitor the effectiveness of risk controls and recommend improvements.

SQLCybersecurityMicrosoft OfficeComplianceRisk ManagementData management

Posted about 10 hours ago
Apply
Apply

πŸ“ Philadelphia, Pennsylvania; Boston, Massachusetts; New York City, New York; Baltimore, Maryland; Washington, D.C.; Charlotte, North Carolina; Raleigh-Durham, North Carolina; Atlanta, Georgia; Chicago, Illinois; CT, DE, FL, GA, IL, IN, MA, MD, MI, NC, NJ, NY, OH, PA, TN, and VA

🧭 Full-Time

πŸ” Information Security

🏒 Company: HealthVerityπŸ‘₯ 101-250πŸ’° $100,000,000 Series D over 3 years agoInformation ServicesInformation TechnologyHealth Care

  • 2-5 years information security and/or system administration experience under Linux-focused on patching, configuration management, and vulnerability remediation
  • ISC2, SANS or similar security certifications
  • Working knowledge of Nmap, Nessus, OpenVPN, tcpdump, OpenSSL and other security related tools
  • Comfortable with scripting in Python and Bash
  • Understanding of data network configuration and infrastructure concepts, including TCP/IP, DNS, routers, internet/intranet/extranet, firewalls, web servers and security hierarchy including the application of encryption key infrastructures and authentication processes
  • Manage and triage security incidents and events daily
  • Own operational security tool administration and optimization of configuration settings
  • Perform scanning activities and ensuring records are created to document and track vulnerabilities
  • Ensure our logging system configuration is consistent with policy and procedure requirements and generates reports that aid in incident response and investigation
  • Participate in select security led projects to expand and/or improve security capabilities
  • Research InfoSec trends, analyze threat intelligence reports via subscribed feeds and recommend security posture changes
  • Aid in identifying procedure maintenance and create documentation as needed
  • Participate in Contingency Planning and Incident Response exercises

PythonSQLBashCybersecurityLinuxComplianceRisk ManagementScripting

Posted 1 day ago
Apply
Apply

πŸ“ London

🧭 Full-Time

πŸ’Έ 64000.0 - 80000.0 GBP per year

πŸ” Information Security

🏒 Company: HackerOne

  • Proven experience with vulnerability disclosure and bug bounty (experience managing a bug bounty program is a plus but not required)
  • 3 years experience manual Web App testing experience
  • Strong technical knowledge of OWASP top 10
  • Comfortable using security testing tools including Burpsuite
  • Experience using frameworks such as CVSS
  • Evaluate assigned vulnerability reports submitted by hackers to determine the validity, risk and severity to HackerOne customers
  • Collaborate with hackers to address missing information from reports as well as educate the HackerOne community members when reports are invalid
  • Compose a technical summary for each valid report that includes clear and concise details regarding the impact, steps to reproduce and remediation advice
  • Ensure clear and efficient communication between hackers and customers
  • Proactively identify and solve issues, as well as accept and quickly respond to delegated work; as we are distributed, being able to win as a team to solve problems is critical to our success
Posted 1 day ago
Apply
Apply

πŸ“ United States

🧭 Full-Time

πŸ’Έ 130000.0 - 160000.0 USD per year

πŸ” Cybersecurity

🏒 Company: VectraπŸ‘₯ 251-500InternetInformation TechnologyTelecommunications

  • Experience as an MDR security analyst or SOC analyst
  • Understanding of intrusion detection systems
  • Experience with SIEM tools and log analysis
  • Knowledge of operating systems and networking protocols
  • Proficient in incident handling and threat hunting
  • Monitor security logs and alerts
  • Investigate and analyze security incidents
  • Complete security response actions
  • Perform threat hunting and proactive analysis
  • Collaborate with multi-functional teams
  • Mentor junior security analysts
  • Conduct health checks and architecture reviews

PythonBash

Posted 3 days ago
Apply
Apply

πŸ“ United States

🧭 Full-Time

πŸ” Renewable Energy

🏒 Company: Pine Gate RenewablesπŸ‘₯ 201-500πŸ’° $500,000,000 Private over 2 years agoSolarEnvironmental EngineeringEnergy ManagementRenewable EnergyEnvironmental ConsultingEnergy StorageFinanceEnergy

  • 5+ years in information technology and cybersecurity
  • Knowledge of ISO 27001, NIST 800-53, NIST CSF
  • Experience with Microsoft 365 Admin/Azure
  • Develop protocols and procedures for security
  • Maintain compliance records
  • Assist with hardware provisioning

CybersecurityMicrosoft Azure

Posted 8 days ago
Apply
Apply

πŸ“ United States

🧭 Contract

πŸ” Healthcare

🏒 Company: Blooming HealthπŸ‘₯ 11-50πŸ’° $4,200,000 Seed over 1 year agoAppsWellnessHealth CareSoftware

  • Strong background in SIEM/SOAR (e.g., Splunk, QRadar)
  • Experience with ITSM processes (Incident, Change, Configuration Management)
  • Hands-on with vulnerability management solutions (e.g., Nessus, Qualys)
  • Scripting/automation skills (Python, PowerShell, Bash)
  • Familiarity with cloud platforms (AWS, Azure, GCP)
  • Plan and implement SIEM/SOAR solutions
  • Establish and refine ITSM processes
  • Oversee vulnerability management program
  • Collect evidence for audits
  • Collaborate with stakeholders
  • Integrate and configure security tools
  • Manage incident response
  • Lead technical security training
  • Propose enhancements for continuous improvement

AWSPythonBashAzureChange Management

Posted 9 days ago
Apply
Apply

πŸ“ United States, United Kingdom

🧭 Full-Time

πŸ’Έ 115000.0 - 130000.0 USD per year

πŸ” Information Security

🏒 Company: HackerOneπŸ‘₯ 201-500πŸ’° $49,000,000 Series E about 3 years agoπŸ«‚ Last layoff over 1 year agoInternetComputerNetwork Security

  • 3+ years of experience in security testing or ethical hacking
  • Strong technical knowledge of OWASP top 10
  • Comfortable using security testing tools such as Burpsuite
  • Evaluate vulnerability reports submitted by hackers
  • Collaborate with hackers to understand vulnerabilities
  • Independently reproduce reported vulnerabilities

Cybersecurity

Posted 9 days ago
Apply
Apply

πŸ“ United States

🧭 Full-Time

πŸ’Έ 115000.0 - 144000.0 USD per year

πŸ” Security

🏒 Company: HackerOneπŸ‘₯ 201-500πŸ’° $49,000,000 Series E about 3 years agoπŸ«‚ Last layoff over 1 year agoInternetComputerNetwork Security

  • Proven experience with vulnerability disclosure and bug bounty (experience managing a bug bounty program is a plus but not required)
  • Hands-on experience doing security testing or ethical hacking on web and mobile applications
  • Strong technical knowledge of OWASP top 10
  • Comfortable using security testing tools including Burpsuite
  • Excellent written and verbal communication skills
  • Experience using frameworks such as CVSS
  • Self-motivated and able to manage your time and energy output while maintaining a consistent and sustainable operational rhythm
  • English fluency
  • Evaluate assigned vulnerability reports submitted by hackers to determine the validity, risk and severity to HackerOne customers
  • Collaborate with hackers to address missing information from reports as well as educate the HackerOne community members when reports are invalid
  • Compose a technical summary for each valid report that includes clear and concise details regarding the impact, steps to reproduce and remediation advice
  • Ensure clear and efficient communication between hackers and customers
  • Proactively identify and solve issues, as well as accept and quickly respond to delegated work; as we are distributed, being able to win as a team to solve problems is critical to our success
  • Assess vulnerability findings and determine whether the submission is valid based on program policies, scope and impact.
  • Independently reproduce reported vulnerabilities in a test environment and compose a technical summary for valid findings.

REST APIJSON

Posted 12 days ago
Apply
Apply

🧭 Full-Time

πŸ’Έ 80000.0 - 100000.0 USD per year

πŸ” Media

  • 2+ years work experience in Information Technology
  • 1+ years of work experience in Cyber Security
  • 1+ years in customer-facing technical engagement roles, including service and solution delivery.
  • Media industry experience (desired)
  • Degree in Computer Science or equivalent field of study (desired)
  • Training in Cyber Security specific disciplines (desired)
  • Ability to communicate effectively with business and technical teams (desired)
  • Demonstrated ability to prioritize and handle multiple initiatives (desired)
  • Demonstrated negotiation and problem-resolution skills (desired)
  • Demonstrated interpersonal, analytical, organizational, written and verbal communication skills (desired)
  • Demonstrated ability to communicate to all levels of an organization (desired)
  • Demonstrated knowledge of recognized Information Security standards and technologies (desired)
  • Demonstrated knowledge of International Information Security and Privacy regulations, laws, and policies (desired)
  • Communicate and coordinate NBC Universal’s Cyber Security strategy, programs, and services with a diverse group of business stakeholders
  • Provide insight and support from the NBC Universal Cyber Security function to inform and align with the business team strategies.
  • Support Cyber Security organization leadership in the identification and communication of relevant Cyber Security-related issues, risks, and events, including leading operational engagement and supporting metrics for measuring Cyber Security maturity
  • Track and coordinate Cyber Security involvement in technical and business-driven technology projects
  • Coordinate and advocate business programs’ security needs with Cyber Security architects, engineers, and analysts
  • Keep abreast of Cyber Security trends, with an ability to articulate security-related themes and principles into business terms
  • Drive the delivery of Cyber Security plans, implementations, and leading practice controls, with an understanding of proactive defense security principles and strategies
  • Lead business-engaged risk exercises to identify and measure risk posture and provide recommendations on mitigation strategies
  • Actively engage and support the security incident response team in the resolution and closing of investigations of incidents with ownership of post-mortem and remediation plans
  • Support the development of business-relevant metrics and key performance indicators to measure Cyber Security program maturity
Posted 14 days ago
Apply

Related Articles

Posted 6 months ago

Insights into the evolving landscape of remote work in 2024 reveal the importance of certifications and continuous learning. This article breaks down emerging trends, sought-after certifications, and provides practical solutions for enhancing your employability and expertise. What skills will be essential for remote job seekers, and how can you navigate this dynamic market to secure your dream role?

Posted 6 months ago

Explore the challenges and strategies of maintaining work-life balance while working remotely. Learn about unique aspects of remote work, associated challenges, historical context, and effective strategies to separate work and personal life.

Posted 6 months ago

Google is gearing up to expand its remote job listings, promising more opportunities across various departments and regions. Find out how this move can benefit job seekers and impact the market.

Posted 6 months ago

Learn about the importance of pre-onboarding preparation for remote employees, including checklist creation, documentation, tools and equipment setup, communication plans, and feedback strategies. Discover how proactive pre-onboarding can enhance job performance, increase retention rates, and foster a sense of belonging from day one.

Posted 6 months ago

The article explores the current statistics for remote work in 2024, covering the percentage of the global workforce working remotely, growth trends, popular industries and job roles, geographic distribution of remote workers, demographic trends, work models comparison, job satisfaction, and productivity insights.